Cyber-threats, information warfare, and critical infrastructure protection :: defending the U.S. homeland /
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Körperschaft: | |
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Westport, Conn. :
Praeger,
2002.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Annotation Annotation |
Beschreibung: | "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." |
Beschreibung: | 1 online resource (viii, 189 pages) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 0313016194 9780313016196 9780275974237 0275974235 1280373865 9781280373862 9786610373864 6610373868 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm54671025 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 040310s2002 ctua ob 000 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d IDEBK |d OCLCQ |d OCLCF |d DKDLA |d NLGGC |d OCLCO |d OCLCQ |d COCUF |d AGLDB |d CNNOR |d SAV |d U3W |d LUE |d OCLCQ |d VTS |d INT |d TOF |d ADU |d E7B |d IOD |d QT5 |d COO |d WY@ |d AZK |d MOR |d PLS |d PIFBR |d STF |d WRM |d NRAMU |d VT2 |d OCLCQ |d YOU |d OCLCQ |d G3B |d A6Q |d K6U |d CHBRC |d INARC |d UNA |d UKCRE |d OCLCQ |d AJS |d OCLCO |d QGK |d OCLCQ |d OCLCO |d UKAHL |d OCLCL | ||
019 | |a 232160958 |a 488393006 |a 531129460 |a 614602171 |a 646706136 |a 722104519 |a 888498616 |a 961656505 |a 961687747 |a 988476086 |a 1081275490 |a 1083551109 |a 1135421278 |a 1145938912 |a 1153553992 |a 1228556820 |a 1259179649 | ||
020 | |a 0313016194 |q (electronic bk.) | ||
020 | |a 9780313016196 |q (electronic bk.) | ||
020 | |a 9780275974237 | ||
020 | |a 0275974235 | ||
020 | |a 1280373865 | ||
020 | |a 9781280373862 | ||
020 | |a 9786610373864 | ||
020 | |a 6610373868 | ||
035 | |a (OCoLC)54671025 |z (OCoLC)232160958 |z (OCoLC)488393006 |z (OCoLC)531129460 |z (OCoLC)614602171 |z (OCoLC)646706136 |z (OCoLC)722104519 |z (OCoLC)888498616 |z (OCoLC)961656505 |z (OCoLC)961687747 |z (OCoLC)988476086 |z (OCoLC)1081275490 |z (OCoLC)1083551109 |z (OCoLC)1135421278 |z (OCoLC)1145938912 |z (OCoLC)1153553992 |z (OCoLC)1228556820 |z (OCoLC)1259179649 | ||
043 | |a n-us--- | ||
050 | 4 | |a UA929.95.E43 |b C67 2002eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Cordesman, Anthony H. | |
245 | 1 | 0 | |a Cyber-threats, information warfare, and critical infrastructure protection : |b defending the U.S. homeland / |c Anthony H. Cordesman with Justin G. Cordesman. |
260 | |a Westport, Conn. : |b Praeger, |c 2002. | ||
300 | |a 1 online resource (viii, 189 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
380 | |a Bibliography | ||
500 | |a "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a The changing nature of critical infrastructure protection -- Threat assessment -- Evolving U.S. policy and response -- Analyzing federal critical infrastructure programs by department and agency -- Assessments of effectiveness -- Role of state and local governments -- Role of private industry -- Lessons from other nations: international vulnerability -- Conclusions and recommendations. | |
588 | 0 | |a Print version record. | |
520 | 8 | |a Annotation |b Looks at the emerging threats to the high-technology sector and the efforts to deal with these threats. | |
520 | 8 | |a Annotation |b Information warfare is upon us. In the last two decades, the U.S. economy's infrastructure has undergone a fundamental set of changes, relying increasingly on its service sector and high technology economy. The U.S. depends on computers, electronic data storage and transfers, and highly integrated communications networks. Its rapidly developing new form of critical infrastructure is exceedingly vulnerable to an emerging host of threats. This detailed volume examines the dangers of, and the evolving U.S. policy response to, cyberterrorism. | |
546 | |a English. | ||
650 | 0 | |a Electronic data processing |x Security measures |z United States. | |
650 | 0 | |a Telecommunication |x Defense measures |z United States. | |
650 | 0 | |a Computer networks |x Security measures |z United States. | |
650 | 0 | |a Information warfare |z United States. | |
650 | 6 | |a Télécommunications |x Défense |x Mesures |z États-Unis. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |z États-Unis. | |
650 | 6 | |a Guerre de l'information |z États-Unis. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Electronic data processing |x Security measures |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 7 | |a Telecommunication |x Defense measures |2 fast | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
700 | 1 | |a Cordesman, Justin G. | |
710 | 2 | |a Center for Strategic and International Studies (Washington, D.C.) |0 http://id.loc.gov/authorities/names/n86119921 | |
758 | |i has work: |a Cyber-threats, information warfare, and critical infrastructure protection (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG63XCqPvGtvtrJfgqQgJC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Cordesman, Anthony H. |t Cyber-threats, information warfare, and critical infrastructure protection. |d Westport, Conn. : Praeger, 2002 |z 0275974235 |w (DLC) 2001036311 |w (OCoLC)47208462 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=99141 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH12853330 | ||
938 | |a ebrary |b EBRY |n ebr10005662 | ||
938 | |a EBSCOhost |b EBSC |n 99141 | ||
938 | |a Internet Archive |b INAR |n cyberthreatsinfo0000cord | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm54671025 |
---|---|
_version_ | 1816881614514290688 |
adam_text | |
any_adam_object | |
author | Cordesman, Anthony H. |
author2 | Cordesman, Justin G. |
author2_role | |
author2_variant | j g c jg jgc |
author_corporate | Center for Strategic and International Studies (Washington, D.C.) |
author_corporate_role | |
author_facet | Cordesman, Anthony H. Cordesman, Justin G. Center for Strategic and International Studies (Washington, D.C.) |
author_role | |
author_sort | Cordesman, Anthony H. |
author_variant | a h c ah ahc |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | UA929 |
callnumber-raw | UA929.95.E43 C67 2002eb |
callnumber-search | UA929.95.E43 C67 2002eb |
callnumber-sort | UA 3929.95 E43 C67 42002EB |
callnumber-subject | UA - Armies |
collection | ZDB-4-EBA |
contents | The changing nature of critical infrastructure protection -- Threat assessment -- Evolving U.S. policy and response -- Analyzing federal critical infrastructure programs by department and agency -- Assessments of effectiveness -- Role of state and local governments -- Role of private industry -- Lessons from other nations: international vulnerability -- Conclusions and recommendations. |
ctrlnum | (OCoLC)54671025 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05341cam a2200805 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm54671025 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">040310s2002 ctua ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">DKDLA</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CNNOR</subfield><subfield code="d">SAV</subfield><subfield code="d">U3W</subfield><subfield code="d">LUE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">INT</subfield><subfield code="d">TOF</subfield><subfield code="d">ADU</subfield><subfield code="d">E7B</subfield><subfield code="d">IOD</subfield><subfield code="d">QT5</subfield><subfield code="d">COO</subfield><subfield code="d">WY@</subfield><subfield code="d">AZK</subfield><subfield code="d">MOR</subfield><subfield code="d">PLS</subfield><subfield code="d">PIFBR</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">NRAMU</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YOU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">G3B</subfield><subfield code="d">A6Q</subfield><subfield code="d">K6U</subfield><subfield code="d">CHBRC</subfield><subfield code="d">INARC</subfield><subfield code="d">UNA</subfield><subfield code="d">UKCRE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">232160958</subfield><subfield code="a">488393006</subfield><subfield code="a">531129460</subfield><subfield code="a">614602171</subfield><subfield code="a">646706136</subfield><subfield code="a">722104519</subfield><subfield code="a">888498616</subfield><subfield code="a">961656505</subfield><subfield code="a">961687747</subfield><subfield code="a">988476086</subfield><subfield code="a">1081275490</subfield><subfield code="a">1083551109</subfield><subfield code="a">1135421278</subfield><subfield code="a">1145938912</subfield><subfield code="a">1153553992</subfield><subfield code="a">1228556820</subfield><subfield code="a">1259179649</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0313016194</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780313016196</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780275974237</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0275974235</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280373865</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280373862</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786610373864</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6610373868</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)54671025</subfield><subfield code="z">(OCoLC)232160958</subfield><subfield code="z">(OCoLC)488393006</subfield><subfield code="z">(OCoLC)531129460</subfield><subfield code="z">(OCoLC)614602171</subfield><subfield code="z">(OCoLC)646706136</subfield><subfield code="z">(OCoLC)722104519</subfield><subfield code="z">(OCoLC)888498616</subfield><subfield code="z">(OCoLC)961656505</subfield><subfield code="z">(OCoLC)961687747</subfield><subfield code="z">(OCoLC)988476086</subfield><subfield code="z">(OCoLC)1081275490</subfield><subfield code="z">(OCoLC)1083551109</subfield><subfield code="z">(OCoLC)1135421278</subfield><subfield code="z">(OCoLC)1145938912</subfield><subfield code="z">(OCoLC)1153553992</subfield><subfield code="z">(OCoLC)1228556820</subfield><subfield code="z">(OCoLC)1259179649</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">UA929.95.E43</subfield><subfield code="b">C67 2002eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cordesman, Anthony H.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-threats, information warfare, and critical infrastructure protection :</subfield><subfield code="b">defending the U.S. homeland /</subfield><subfield code="c">Anthony H. Cordesman with Justin G. Cordesman.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Westport, Conn. :</subfield><subfield code="b">Praeger,</subfield><subfield code="c">2002.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (viii, 189 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="380" ind1=" " ind2=" "><subfield code="a">Bibliography</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Published in cooperation with the Center for Strategic and International Studies, Washington, D.C."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">The changing nature of critical infrastructure protection -- Threat assessment -- Evolving U.S. policy and response -- Analyzing federal critical infrastructure programs by department and agency -- Assessments of effectiveness -- Role of state and local governments -- Role of private industry -- Lessons from other nations: international vulnerability -- Conclusions and recommendations.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">Looks at the emerging threats to the high-technology sector and the efforts to deal with these threats.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">Information warfare is upon us. In the last two decades, the U.S. economy's infrastructure has undergone a fundamental set of changes, relying increasingly on its service sector and high technology economy. The U.S. depends on computers, electronic data storage and transfers, and highly integrated communications networks. Its rapidly developing new form of critical infrastructure is exceedingly vulnerable to an emerging host of threats. This detailed volume examines the dangers of, and the evolving U.S. policy response to, cyberterrorism.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Telecommunication</subfield><subfield code="x">Defense measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Télécommunications</subfield><subfield code="x">Défense</subfield><subfield code="x">Mesures</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre de l'information</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Telecommunication</subfield><subfield code="x">Defense measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cordesman, Justin G.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Center for Strategic and International Studies (Washington, D.C.)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n86119921</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cyber-threats, information warfare, and critical infrastructure protection (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG63XCqPvGtvtrJfgqQgJC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Cordesman, Anthony H.</subfield><subfield code="t">Cyber-threats, information warfare, and critical infrastructure protection.</subfield><subfield code="d">Westport, Conn. : Praeger, 2002</subfield><subfield code="z">0275974235</subfield><subfield code="w">(DLC) 2001036311</subfield><subfield code="w">(OCoLC)47208462</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=99141</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH12853330</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10005662</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">99141</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">cyberthreatsinfo0000cord</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
geographic_facet | United States |
id | ZDB-4-EBA-ocm54671025 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:31Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/n86119921 |
isbn | 0313016194 9780313016196 9780275974237 0275974235 1280373865 9781280373862 9786610373864 6610373868 |
language | English |
oclc_num | 54671025 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (viii, 189 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Praeger, |
record_format | marc |
spelling | Cordesman, Anthony H. Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland / Anthony H. Cordesman with Justin G. Cordesman. Westport, Conn. : Praeger, 2002. 1 online resource (viii, 189 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Bibliography "Published in cooperation with the Center for Strategic and International Studies, Washington, D.C." Includes bibliographical references. The changing nature of critical infrastructure protection -- Threat assessment -- Evolving U.S. policy and response -- Analyzing federal critical infrastructure programs by department and agency -- Assessments of effectiveness -- Role of state and local governments -- Role of private industry -- Lessons from other nations: international vulnerability -- Conclusions and recommendations. Print version record. Annotation Looks at the emerging threats to the high-technology sector and the efforts to deal with these threats. Annotation Information warfare is upon us. In the last two decades, the U.S. economy's infrastructure has undergone a fundamental set of changes, relying increasingly on its service sector and high technology economy. The U.S. depends on computers, electronic data storage and transfers, and highly integrated communications networks. Its rapidly developing new form of critical infrastructure is exceedingly vulnerable to an emerging host of threats. This detailed volume examines the dangers of, and the evolving U.S. policy response to, cyberterrorism. English. Electronic data processing Security measures United States. Telecommunication Defense measures United States. Computer networks Security measures United States. Information warfare United States. Télécommunications Défense Mesures États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. Guerre de l'information États-Unis. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Electronic data processing Security measures fast Information warfare fast Telecommunication Defense measures fast United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Cordesman, Justin G. Center for Strategic and International Studies (Washington, D.C.) http://id.loc.gov/authorities/names/n86119921 has work: Cyber-threats, information warfare, and critical infrastructure protection (Text) https://id.oclc.org/worldcat/entity/E39PCG63XCqPvGtvtrJfgqQgJC https://id.oclc.org/worldcat/ontology/hasWork Print version: Cordesman, Anthony H. Cyber-threats, information warfare, and critical infrastructure protection. Westport, Conn. : Praeger, 2002 0275974235 (DLC) 2001036311 (OCoLC)47208462 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=99141 Volltext |
spellingShingle | Cordesman, Anthony H. Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland / The changing nature of critical infrastructure protection -- Threat assessment -- Evolving U.S. policy and response -- Analyzing federal critical infrastructure programs by department and agency -- Assessments of effectiveness -- Role of state and local governments -- Role of private industry -- Lessons from other nations: international vulnerability -- Conclusions and recommendations. Electronic data processing Security measures United States. Telecommunication Defense measures United States. Computer networks Security measures United States. Information warfare United States. Télécommunications Défense Mesures États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. Guerre de l'information États-Unis. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Electronic data processing Security measures fast Information warfare fast Telecommunication Defense measures fast |
title | Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland / |
title_auth | Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland / |
title_exact_search | Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland / |
title_full | Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland / Anthony H. Cordesman with Justin G. Cordesman. |
title_fullStr | Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland / Anthony H. Cordesman with Justin G. Cordesman. |
title_full_unstemmed | Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland / Anthony H. Cordesman with Justin G. Cordesman. |
title_short | Cyber-threats, information warfare, and critical infrastructure protection : |
title_sort | cyber threats information warfare and critical infrastructure protection defending the u s homeland |
title_sub | defending the U.S. homeland / |
topic | Electronic data processing Security measures United States. Telecommunication Defense measures United States. Computer networks Security measures United States. Information warfare United States. Télécommunications Défense Mesures États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. Guerre de l'information États-Unis. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Electronic data processing Security measures fast Information warfare fast Telecommunication Defense measures fast |
topic_facet | Electronic data processing Security measures United States. Telecommunication Defense measures United States. Computer networks Security measures United States. Information warfare United States. Télécommunications Défense Mesures États-Unis. Réseaux d'ordinateurs Sécurité Mesures États-Unis. Guerre de l'information États-Unis. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Electronic data processing Security measures Information warfare Telecommunication Defense measures United States |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=99141 |
work_keys_str_mv | AT cordesmananthonyh cyberthreatsinformationwarfareandcriticalinfrastructureprotectiondefendingtheushomeland AT cordesmanjusting cyberthreatsinformationwarfareandcriticalinfrastructureprotectiondefendingtheushomeland AT centerforstrategicandinternationalstudieswashingtondc cyberthreatsinformationwarfareandcriticalinfrastructureprotectiondefendingtheushomeland |